Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1yd2Y5LThmcXItcDQ0bc4AA4SG
Qualys Jenkins Plugin for Policy Compliance Cross-site Scripting vulnerability
Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access and access to configure or edit jobs to utilize the plugin to configure a potential rouge endpoint via which it was possible to control response for certain request which could be injected with XSS payloads leading to XSS while processing the response data.
Permalink: https://github.com/advisories/GHSA-rwf9-8fqr-p44mJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1yd2Y5LThmcXItcDQ0bc4AA4SG
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 11 months ago
Updated: 10 months ago
CVSS Score: 5.7
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Identifiers: GHSA-rwf9-8fqr-p44m, CVE-2023-6148
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-6148
- https://www.qualys.com/security-advisories/
- https://www.qualys.com/security-advisories/cve-2023-6148/
- http://www.openwall.com/lists/oss-security/2024/01/24/6
- https://github.com/advisories/GHSA-rwf9-8fqr-p44m
Affected Packages
maven:com.qualys.plugins:qualys-pc
Affected Version Ranges: < 1.0.6Fixed in: 1.0.6